[106176] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: SANS: DNS Bug Now Public?

daemon@ATHENA.MIT.EDU (Phil Regnauld)
Thu Jul 24 04:45:36 2008

Date: Thu, 24 Jul 2008 10:45:05 +0200
From: Phil Regnauld <regnauld@catpipe.net>
To: Joe Abley <jabley@ca.afilias.info>
In-Reply-To: <2A44845F-4D1F-47A8-B6F7-09B50C65C8B4@ca.afilias.info>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

Joe Abley (jabley) writes:
>
> Having just seen some enterprise types spend time patching their 
> nameservers, it's also perhaps worth spelling out that "patch" in this case 
> might require more than upgrading resolver code -- it could also involve 
> reconfigurations, upgrades or replacements of NAT boxes too. If your NAT 
> reassigns source ports in a predictable fashion, then no amount of BIND9 
> patching is going to help.

	Case in point, we've got customers running around in circles
	screaming "we need to upgrade, please help us upgrade NOW",
	but they have _3_ layers of routers and firewalls that are hardcoded to
	only allow DNS queries from port 53.


home help back first fref pref prev next nref lref last post